Cybersecurity student with hands-on experience in black box penetration testing and security analysis of government websites. Proficient in defining security assessment scopes, client interaction, financial oversight, and drafting detailed security analysis reports. Skilled in conducting risk assessments, implementing security protocols, and collaborating with cybersecurity teams to monitor and respond to cyber incidents. Technical expertise includes CAD, Python, C, JAVA, and various cybersecurity tools and techniques such as network security, phishing awareness, two-factor authentication, social engineering, cryptography, secure coding, and intrusion detection. Driven Cybersecurity Intern known for high productivity and efficient task completion. Possess specialized skills in network security, threat analysis, and encryption technologies. Excels in critical thinking, problem-solving, and communication, ensuring to excel in challenging cybersecurity environments.
Conducted fingerprinting for 5G networks using ORAN, collecting and analyzing data to develop a machine learning algorithm for detecting network security risks. Designed and reconfigured a 3D printer to precisely navigate an antenna around a base station, connected to Husky (ChipWhisperer) simulating intruder activity. Leveraged side-channel analysis to evaluate differences in electromagnetic waves and power traces under varying configurations. Successfully set up a complete 4G system and initiated the deployment of a partial 5G system to support research objectives. This work enhanced my expertise in network security, data analysis, and system configuration in advanced communication networks.
As a Cybersecurity Intern at AISN Network, I conducted black box penetration testing and security assessments on government websites, identifying vulnerabilities and analyzing security weaknesses without prior system knowledge. I defined the scope and boundaries of security assessments to ensure compliance with contractual and regulatory standards, while collaborating with government officials and project teams to manage expectations and maintain effective communication. Additionally, I monitored budget allocation and resource utilization, gaining insight into financial management within cybersecurity projects. I also contributed to detailed security analysis reports, providing actionable recommendations for remediation. This experience strengthened my skills in cybersecurity protocols, project management, and client relations in high-pressure environments.